⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 readme.spade

📁 入侵检测系统.linux下与MySql连用的例子
💻 SPADE
字号:
README file for the Spade v092200.1-----------------------------------Greetings,Welcome to release version 092200.1 of the Spade sensor, spp_anomsensor. Spade stands for Statistical Packet Anomaly Detection Engine and is producedby Silicon Defense (http://www.silicondefense.com/).  It is a Snort plugin toreport unusual, possibly suspicious, packets.This document gives an overview of Spade.  The "Getting Started" sectiontowards the end of the file will help you get going quickly.  See the Usagefile for information about installing and using Spade.  See the COPYING filefor the GNU GPL license.SPICE is the Stealthy Probing and Intrusion Correlation Engine.  It is part ofSilicon Defense's work an (unclassified) project funded by the US DARPA(though they should not be assumed to endorse this particular work).  It willeventually consist of two parts, an anomaly sensor (Spade) and a portscancorrelator.  The basic operation of this will be that Spade will monitor thenetwork and report anomalous events to the correlator.  The correlator willthen group these events together and send out reports of portscans, even thosethat have been crafted to be difficult to detect (e.g., they probe slowly,from different sources, or they randomize the scan).  This distribution is thesensor component of Spice.  The correlator is under active development.We release this in the hopes that it will be useful.  We note though that itis experimental and that it will be better when the correlator is available. That being said, we have found it useful in identifying events that are partof a portscan.  Your mileage may vary.We would really like your comments on Spade.  One of the reasons we havereleased this is so that we will have different people's feedback so that wecan improve it.  In particular, we know that your experience with this willdepend on the characteristics of your network.  E-mail the contact author, JimHoagland (hoagland@SiliconDefense.com) with any comments or suggestions.This is released under GNU GPL, which among other things, means that weexpress no warranty for the program.The web page for Spade and Spice is http://www.silicondefense.com/spice/.  Youcan download the latest releases of it there.-= What does it do? =-Spade will review the packets received by Snort, find those of interest (TCPSYNs into your homenets, if any), and report those packets that it believesare anomalous along with an anomaly score.The anomaly score that is assigned is based on the observed history of thenetwork.  The fewer times that a particular kind of packet has occurred in thepast, the higher its anomaly score will be.  Packets are classified by theirjoint occurrence of packet field values.  For example, packets withdestination IP of 10.10.10.10 and destination port of 8080 might be one kindof packet.To do this, a probability table is maintained that reflects the occurrences ofdifferent kinds of packets in history, with higher weight on more recentevents.  We would know, for example, that P(dip=10.10.10.10,dport=8080) is 10%but that P(dip=10.10.10.10,dport=8079) is 0.1%.  The anomaly score iscalculated directly from the probability.  For a packet X, A(X)= -log2(P(X)). So the anomaly score for a 10.10.10.10, 8080 packet is 3.32 (not veryanomalous) and the score for a 10.10.10.10, 8079 packet is 9.97 (fairlyanomalous (?)).At any given time, a reporting threshold is defined for the sensor.  For eachevent that exceeds this threshold, an alert is sent.  It is sent to the sameplace(s) that a rule-based alert would be sent to (e.g., Snort alert file,syslog, etc.).In addition to reporting anomalous events, Spade can also be configured togenerate reports about the network on which it is run.  For example, it cantell you the amount of entropy in your destination ports and in your sourceports given your destination ports or produce periodic reports of the numberof packets seen and order statistics such as median of the anomaly scoresproduced.-= What doesn't it do? =-Spade cannot tell you if a particular reported packet is bad or hostile.   Itmerely knows that certain packets are relatively unusual and has an idea howunusual.  You should expect to see alerts about benign activity.It also cannot report things like attempts to exploit CGI vulnerabilities on apopular web server.  This would depend on looking at the packet contents andSpade just looks at certain parts of the header.Spade will not group related anomalous events together.  That will be the jobof the correlator when it is complete.  You might consider using SnortSnarf(http://www.silicondefense.com/snortsnarf/) to help with this task; version090700.1 generates a special section to browse anomaly reports.-= Spade Output =-Spade produces two types of messages, which are sent to wherever Snort usuallysends alerts (e.g., alert file, syslog, etc.).The more common one has the message "spp_anomsensor: Anomaly thresholdexceeded: A", where A is a number.  This indicates that the packet mentionedwas assessed as anomalous and the anomaly score was A.Spade may also periodically produce messages of the form: "spp_anomsensor:Threshold adjusted to T after X alerts (of N)".  This indicates that thealerting threshold was changed to T.  This happens when you are using one ofthe threshold adapting mechanisms (see the Usage file).  The message alsogives information about the number of alerts (X) sent since the last time thethreshold was adjusted and the total number of packets (N) accepted by Spadeduring that time.-= Performance =-Efficiency will depend on many factors including configuration and will varyfrom network to network.  We were able to go through a file of 1.25 millionTCPSYN packets in about 2 minutes on a modern desktop machine, includinggenerating reports and probability maintenance but not with any Snort rules orplugins.   That is about 96 microseconds per packet.  Memory usage varied from2Mb to 42Mb depending on the probability mode.  If your network sees moretraffic, especially different kinds of traffic, we would expect that yourmemory usage will increase proportionally and your CPU use to increase alittle (per packet).Stability seems good.  We have had it running on an ISP for 5 weeks withoutany problems.  When you are first running it, you might want to run it in aseparate Snort process though, just in case.-= Getting Started =-First you will need to install Spade into Snort as described in the"Installation" file.Since Spade is experimental, it is safest to initially run it in its own Snortprocess.  That is, run Snort as you have it now, but also run a second copythat just has Spade configured to run.spade.config is an example configuration file; use it as your Snort configfile or include it in your current Snort config file.  It is a good startingpoint for most people as distributed.  If you want to get going quickly, youmight just want to edit the SPADEDIR variable and the spade-homenet list andtry it out.  Otherwise, you can browse through the Usage file to see what allyour options are.-= Contributions =-We welcome your complaints, kudos, and especially improvements and bugfixes.  We wish for this to be a useful as possible, so your feedback and assistanceis important.  You may reach us at hoagland@SiliconDefense.com.Thank you and happy Spading!-- Jim Hoagland (hoagland@SiliconDefense.com)   Stuart Staniford (stuart@SiliconDefense.com)

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -